Verified restart of Ubuntu
Verified restart of Ubuntu
You're facing a common challenge with encrypted systems. Since your desktop is locked with Luks, you can't just bypass the password during a reboot. However, you might explore options like using a recovery agent or adjusting your system's boot settings to allow password entry at shutdown instead of requiring it during startup. Consult your Ubuntu documentation for specific steps related to recovery and boot configurations.
Accessing a LUKS-protected root drive from afar using SSH
An older piece of content that fits your request
I'm uncertain about how that addresses the BasicAMods question. Generally, I believe it's not wise to attempt what you want yourself. You should keep the password in plain text securely (as shown in the example where unlocking happens via SSH), which could be acceptable for you, but it poses a significant security risk if someone gains access to the file containing your password—this might render encryption unnecessary. In cases where you need the computer to detect reboots or power-offs, these situations are essentially identical from the device's perspective. You'll likely need to store the encryption key in something that remains active after reboots (though not during power loss), which still introduces security concerns.
The key file required is the SSH key, not the Luks key. If you wish to follow the approach from the article, replace "MyS3cr3tK3y" with your real password. If it’s still current, it should function. To prevent others from accessing your password in your bash history, disable it in the present shell: unset HISTFILE. This change applies only to the terminal you’re using and won’t impact the rest of your system.